Presentation is loading. Please wait.

Presentation is loading. Please wait.

May 2018 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]

Similar presentations


Presentation on theme: "May 2018 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]"— Presentation transcript:

1 May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC] Date Submitted: [9 March, 2018] Source: [Joerg ROBERT] Company [Friedrich-Alexander University Erlangen-Nuernberg] Address [Am Wolfsmantel 33, Erlangen, Germany] Voice:[ ], FAX: [ ], Re: [] Abstract: [Presentation of SCHC for discussion within TG] Purpose: [Presentation in TG w] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P Joerg ROBERT, FAU Erlangen-Nuernberg

2 Discussion on Suitable Parameters for SCHC
May 2018 Discussion on Suitable Parameters for SCHC Joerg Robert (University Erlangen-Nuernberg) Joerg Robert, FAU Erlangen-Nuernberg

3 May 2018 Motivation Discussion of technology specific SCHC parameters, as SCHC itself only defines a framework Technology specific parameters are listed on the IETF LPWAN reflector (listed on next slides) Latest version of SCHC draft is available on the IETF website Joerg Robert, FAU Erlangen-Nuernberg

4 List of Technology Specific Parameters
May 2018 List of Technology Specific Parameters In the architecture explain the SCHC entities, how they will be represented in the corresponding technology architecture. How to learn the context Size of the Rule id The way the Rule id is sent (L2 or L3) and how (describe) Use of padding and how and when to use it Fragmentation delivery reliability option used over your technology and why Define the MAX_ACK_REQUEST Define the number of bits needed for Rule-id, FCN (N) and DTag (T) Joerg Robert, FAU Erlangen-Nuernberg

5 List of Technology Specific Parameters (Cont’d)
May 2018 List of Technology Specific Parameters (Cont’d) The algorithm to be used for the MIC if it is different from the default The timer size for Fragmentation ACK always When to abort in ACK always MAX_ATTEMPS counter size In ACK on error the timer size between windows The L2 CRC used to increase reliability Joerg Robert, FAU Erlangen-Nuernberg

6 May 2018 IG LPWA Use-Cases The Interest Group LPWA listed different use-cases that may be relevant for LPWAN in 15-16/770r5 According to the discussed use-cases the typical LPWAN use-case has the following parameters Focusing on uplink data Typical Payload data length <= 16 bytes No strict latency requirements Use-cases with longer payload data an higher bit-rate requirements may employ existing header compression schemes Joerg Robert, FAU Erlangen-Nuernberg

7 Open Questions Who triggers the data transmission
May 2018 Open Questions Who triggers the data transmission Initiated by LPWAN sensor node? REST model? (e.g. CoAP) Do we assume uplink-only devices? How many different IPv6 addresses are contacted by a LPWAN sensor node? Do we use different UDP ports? Do we use different protocols? What kind of protocols? What is the maximum PSDU length? Can we identify fields in the MAC header that we do not require? Joerg Robert, FAU Erlangen-Nuernberg

8 May 2018 Working Assumptions The following slides will define working assumptions for the different parameters in order to reflect the TG discussions The idea is to be able to specify the requirements for the technology specific parameters Joerg Robert, FAU Erlangen-Nuernberg

9 MAC Header Compression
May 2018 MAC Header Compression All parameters that are identical could be compressed, e.g. MAC address (TX or RX) Parameters such as the time, frequency, or spreading code in case of DSSS could be used to identify the device Additional work is needed to indicate how MAC parameters could be compressed in real applications Joerg Robert, FAU Erlangen-Nuernberg

10 Potentially Used IPv6 Protocols
May 2018 Potentially Used IPv6 Protocols LPWAN sensor nodes may have to be able to support multiple protocols, e.g. CoAP, MQTT The protocols typically operate using UDP Also REST models should be supported Joerg Robert, FAU Erlangen-Nuernberg

11 Number of Different Rule ID
May 2018 Number of Different Rule ID LPWAN devices may have to support different protocols (e.g. CoAP, MQTT) Typical LPWAN devices may have to be able to contact several IPv6 addresses Typical configuration may require up to 8 different Rule ID  3 bits Joerg Robert, FAU Erlangen-Nuernberg

12 Fragmentation Only LECIM DSSS PHY offers PHY fragmentation
May 2018 Fragmentation Only LECIM DSSS PHY offers PHY fragmentation SCHC fragmentation has to be used for current systems (exception LECIM DSSS) Joerg Robert, FAU Erlangen-Nuernberg

13 Fragmentation Acknowledgement Mode
May 2018 Fragmentation Acknowledgement Mode Layer 2 should do the acknowledgment because it offers higher energy efficiency Use of No-ACK mode in addition to L2 acknowledgement should ensure the require reliability Only use of No-ACK mode No SCHC ACK packets required Joerg Robert, FAU Erlangen-Nuernberg

14 May 2018 DTAG (Datagram Tag) DTAG enables interleaving of multiple IPv6 fragments Use of DTAG increases LPWAN sensor node complexity No clear use-case found No use of DTAG, i.e. DTAG is encoded with 0 bits Similar functionality can be achieved by frame aborts Joerg Robert, FAU Erlangen-Nuernberg

15 Device IPv6 Address Mapping
May 2018 Device IPv6 Address Mapping The group agreed that the mapping between IPv6 and MAC addresses should be left to the network operator Joerg Robert, FAU Erlangen-Nuernberg

16 MIC (Message Integrity Check)
May 2018 MIC (Message Integrity Check) In case of SCHC fragmentation a MIC is required CRC-16 or CRC-32 as defined in could be used Any suggestion? Joerg Robert, FAU Erlangen-Nuernberg

17 Resulting SCHC Parameters (Working Assumption)
May 2018 Resulting SCHC Parameters (Working Assumption) Parameter Value Size of Rule ID 3 bits Fragmentation delivery reliability No-ACK mode DTAG 0 bits (not used) FCN 1 bit MIC CRC-16/CRC-32 Retransmission Timer N/A Inactivity Timer MAX_ACK_REQUESTS MAX_WIND_FCN Joerg Robert, FAU Erlangen-Nuernberg

18 Thank You for Your Interest!
May 2018 Thank You for Your Interest! Joerg Robert, FAU Erlangen-Nuernberg


Download ppt "May 2018 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]"

Similar presentations


Ads by Google